One careless click – €1.4 million in damages 💸 That's the average cost of a ransomware attack on businesses – not including ransom payments. According to a recent study ("The State of Ransomware 2025"), this sum arises from business interruption, system recovery, lost business opportunities, and the erosion of trust. ⚠️ Would your systems still be online tomorrow? And what would be the consequences of an attack on your company? Security gaps have long threatened entire business models. Today, strong cybersecurity is crucial for on-time deliveries, market stability, and customer confidence. Given the alarming figures on cyberattacks, one would assume that all companies are now well prepared to deal with this threat. In practice, however, this is often far from the case, which is why legislators have introduced regulations to raise the overall level of security. 🏛️ Take, for example, the NIS 2 Directive (Network and Information Security Directive 2) which the European Union has introduced to address the surge in cyberattacks. NIS 2 is obliging companies to strengthen their cyber defenses – including in the energy, electrical engineering, healthcare, manufacturing, and ICT sectors. The NIS2 transformation process in national EU member state law is coming to an end, e.g. Germany finalized the implementation on Dec. 6th, 2025. 🔍 Many companies welcome stricter cybersecurity requirements. In Germany, for example, the TÜV Cybersecurity Study 2025 found that 56 percent of German companies support legal obligations. However, only half of those surveyed are familiar with the NIS 2 Directive – a dangerous blind spot. NIS 2 significantly expands the scope of EU cybersecurity regulation: more industries, more companies, stricter liability. Top management now bears personal responsibility if obligations are breached. 👉 Companies must now review and adapt their risk management, emergency plans, and reporting processes. Incidentally, this is due not only to stricter regulations, but also to the changing nature of attacks resulting from AI — attackers can now launch much more targeted attacks. According to the TÜV Cybersecurity Study, however, only one in ten companies currently uses AI for defense. 🛠️ TÜV Rheinland Cybersecurity supports companies strategically and operationally in implementing NIS 2, establishing sustainable IT compliance management and adapting to constantly changing cybersecurity requirements. Discover how ➡️ https://lnkd.in/g-Uy-Hs7 #tuvrheinland #nis2 #cybersecurity #saferinternetday #tuvoices
Cybersecurity Compliance Guidelines
Explore top LinkedIn content from expert professionals.
-
-
𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐑𝐞𝐬𝐢𝐥𝐢𝐞𝐧𝐜𝐞 𝐀𝐜𝐭 (𝐂𝐑𝐀) 𝐡𝐚𝐬 𝐨𝐟𝐟𝐢𝐜𝐢𝐚𝐥𝐥𝐲 𝐛𝐞𝐞𝐧 𝐚𝐝𝐨𝐩𝐭𝐞𝐝 𝐛𝐲 𝐭𝐡𝐞 𝐄𝐔 𝐂𝐨𝐮𝐧𝐜𝐢𝐥. This isn't just another regulatory move; it’s a clear signal that cybersecurity is no longer an option but a necessity for any product with digital components. It’s not just about technology anymore; it’s about responsibility and sustainability in the digital space. I’ve been closely following the evolution of the CRA, right from its draft stages in 2022 to today’s milestone. What stands out to me is the scope—every product with digital elements sold in the EU, from smart gadgets to industrial equipment, will now need to comply with mandatory cybersecurity standards and display the CE marking by 2027. 𝐖𝐡𝐲 𝐝𝐨𝐞𝐬 𝐭𝐡𝐢𝐬 𝐦𝐚𝐭𝐭𝐞𝐫? In my view, this is a massive opportunity for startups and innovators, particularly those in emerging markets like India, who are looking to enter the EU’s competitive terrain. Compliance is often seen as a hurdle, but the CRA actually creates a uniform framework that levels the playing field for startups and established companies alike. We’ve all seen the damage caused by cyberattacks—financial losses, trust erosion, and the struggle to maintain secure digital infrastructures. The CRA addresses this directly, and I believe it will drive a new wave of product innovation focused on security, reliability, and consumer trust. 𝐖𝐡𝐲 𝐓𝐡𝐢𝐬 𝐌𝐚𝐭𝐭𝐞𝐫𝐬 𝐭𝐨 𝐒𝐭𝐚𝐫𝐭𝐮𝐩𝐬 𝐚𝐧𝐝 𝐈𝐧𝐧𝐨𝐯𝐚𝐭𝐨𝐫𝐬: 📌 The CRA creates a level playing field for global companies by enforcing uniform cybersecurity standards. Startups need to embed security in their product development cycle, from ideation to deployment. 📌 Startups entering the EU market must ensure early compliance with these standards to remain competitive and secure. Legal and regulatory frameworks will require startups to dedicate resources toward cybersecurity audits, documentation, and CE marking processes. Working closely with cybersecurity mentors, incubation officers, and regulatory experts will be essential to staying ahead of compliance requirements. 📌 It fosters a culture of trust and transparency, critical for both B2B and B2C sectors. 𝐊𝐞𝐲 𝐅𝐚𝐜𝐭𝐬 & 𝐅𝐢𝐠𝐮𝐫𝐞𝐬: 📌A study by McKinsey highlights that 75% of consumers in Europe are more likely to trust and purchase products with verified cybersecurity standards, underscoring the business potential for compliant startups. 📌 The CRA will affect over 50,000 businesses globally. 📌 The cost of cyberattacks is projected to exceed $10.5 trillion annually by 2025, underscoring the need for stronger regulations. 📌 The EU digital market is expected to grow at a CAGR of 11%, positioning cybersecurity as a key business driver. The CRA is not just a regulation but a catalyst for the next generation of secure innovation. #cyberresilienceact #eucouncil #businessworld #security #privacy #onlinefraud #smartgadgets #startup
-
European Parliamentary Research Service: EU Cyber Resilience Act (#CRA) New technologies come with new risks, and the impact of cyber-attacks through digital products has increased dramatically in recent years. Consumers are increasingly falling victim to security flaws linked to digital products such as baby monitors, robo-vacuum cleaners, Wi-Fi routers and alarm systems. For businesses, the importance of ensuring that digital products in the supply chain are secure has become pivotal, considering three in five vendors have already lost money as a result of product security gaps. The European Union's lawmakers signed the 'cyber-resilience act' in October 2024. The regulation imposes cybersecurity obligations on all products with digital elements whose intended and foreseeable use includes direct or indirect data connection to a device or network. The regulation introduces cybersecurity by design and by default principles and imposes a duty of care for the lifecycle of products. The Cyber Resilience Act was published in the EU's Official Journal on 20 November 2024. It entered into force in December 2024 and will apply in full as of 11 December 2027.
-
The EU just changed the cybersecurity vendor selection game. And most CISOs don't realise it yet. The proposed EU Cybersecurity Act 2 (CSA2) would give the European Commission power to designate entire countries as "high-risk" and mandate exclusion of vendors tied to those jurisdictions from critical infrastructure. While China is the obvious target, the logic extends to any non-European supplier, including those potentially subject to the US CLOUD Act. What this means practically: Your current security stack may create sovereign risk you can't mitigate. Not theoretical risk. Compliance risk with legal consequences. Within 12-24 months of CSA2 passing, you'll likely need documented answers to: * Where exactly is our data processed? * Who owns our security vendors? * What foreign government requests could they be subject to? * How do we prove supply chain defensibility to auditors? The uncomfortable truth: Most CISOs can't answer these questions about their current vendors without significant research. Three things to do now: 1) Audit your security supply chain. Not just security capabilities - jurisdictional exposure. Where data lives matters as much as how it's protected. 2) Ask your vendors the hard questions. Data residency isn't enough. You need ownership structure, government request protocols, and documented NIS2 control mapping. 3) Factor sovereignty into vendor selection. Security outcomes AND procurement defensibility. Both matter when regulations tighten. CSA2 represents a market shift: from purely technical security evaluation to geopolitical risk assessment of your entire vendor ecosystem. The vendors who can provide both security excellence and jurisdictional clarity will win in the new EU compliance environment. Question for CISOs with European operations: How prepared is your organisation to defend your security vendor choices under stricter sovereignty requirements? At Mimecast, we're UK-headquartered with deep EU operations. We're building resources to help CISOs navigate this transition because making you look strategic to your board is what we do. More coming soon.
-
The latest State of Cybersecurity in the EU report provides a critical snapshot of the EU’s cybersecurity landscape, revealing both progress and pressing challenges. Here are key highlights from the report 🔑 The NIS2 Directive and new initiatives like the Cyber Resilience Act aim to enhance cybersecurity across sectors. 🔑 Ransomware, DDoS attacks, and geopolitical cyber activities dominate, with supply chain vulnerabilities adding complexity. 🔑 Progress & Gaps: The EU Cybersecurity Index shows progress (62.65/100), but disparities in R&D, education, and policy implementation persist. 🔑 Sector Readiness: Telecoms, finance, and electricity sectors lead in maturity, while health and gas sectors require greater attention. 🔑 Future Challenges: Emerging risks from AI, quantum computing, and unpatched vulnerabilities demand adaptive strategies. 💡 So, what is next? Harmonizing national efforts and fostering a skilled cybersecurity workforce. Strengthening supply chain security and enhancing public awareness. Leveraging the Cyber Solidarity Act for better crisis management. The report underscores the need for collective action to address evolving threats and ensure a secure digital future. 👉 Read more and join the conversation to build a resilient cyber ecosystem. #Cybersecurity #DigitalResilience #ENISA
-
Hey Andy Watkin-Child CSyP, CEng, MSyI, MIMechE. On Tuesday, the Parliament approved new cyber resilience standards to protect all digital products in the European Union from cyber threats. It's well worth reading. In an era where the digital world is increasingly intertwined, the recent adoption of the #CyberResilienceAct (CRA) by the European Parliament marks a significant stride towards a safer digital future. This groundbreaking regulation, aimed at bolstering the security of digital products, is a commendable move that deserves our full support. The CRA focuses on a comprehensive approach to cybersecurity. This act covers an extensive range of products, from connected doorbells and baby monitors to Wi-Fi routers. This inclusivity is crucial, considering the ubiquitous nature of digital devices in our daily lives. The provision for automatic security updates, where technically feasible, is particularly noteworthy. It ensures that our devices are secure at the time of purchase and remain protected throughout their lifecycle. Differentiating critical products based on their cybersecurity risk is a pragmatic approach. By categorizing products, the regulation allows for a more focused and efficient allocation of resources. High-risk products will undergo stringent examination, ensuring our most vital digital assets receive the highest scrutiny and protection. The involvement of the European Union Agency for Cybersecurity (ENISA) is another commendable aspect of the Act. ENISA’s role in assessing and responding to vulnerabilities and incidents will enhance the collective cyber resilience of EU member states. Additionally, including products such as identity management systems, password managers, and smart home assistants broadens the scope of protection, reflecting an understanding of the diverse ways we interact with technology. With an overwhelming majority of the Parliament in favor, the Act is on its way to becoming law, pending formal adoption by the Council. This legislation is timely and necessary, considering the increasing prevalence of cyber-attacks and the growing dependency on digital products. In conclusion, the CRA is not just about enhancing the security of digital products; it’s about safeguarding our modern way of life. It represents a collective effort towards a more secure digital environment where consumers and businesses can trust the technology that underpins their daily activities. As we continue to navigate through the digital age, such proactive and comprehensive measures are essential to ensure a safe, secure, and resilient digital future for everyone. Veritas GRC, Brian Levine, Gerry Kennedy, Rich Waite, M.Ed. George Sawyer, Thaddeus Dziekanowski https://lnkd.in/gnnQgZ43.
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development